SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
1© Copyright 2013 EMC Corporation. All rights reserved.
Beware of the Risk Behind
Big Data
Garth Landers
Director, Product Marketing
Information Intelligence Group
Twitter - @garthlanders
2© Copyright 2013 EMC Corporation. All rights reserved.
Agenda
• Big Data/Dark Data
• How to get control over Dark Data
• Use Cases
3© Copyright 2013 EMC Corporation. All rights reserved.
Big Data = Structured+Unstructured Data
Structured Information
In Relational Databases
Managed & Unmanaged
Unstructured Information
Internet Of Things
Telemetry, Location-Based Information etc.
Non-Enterprise Information
The Digital Universe Is Growing By 7,600 PB / Day
4© Copyright 2013 EMC Corporation. All rights reserved.
Functional Areas Where Companies Are Using Big Data
How Companies Are Using Big Data Analytics
McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012.
Customer Intimacy
Budgeting & Planning
Operations & Supply Chain
Customer Service
Performance Management
New Product Strategy
Pricing
0 10 20 30 40 50
49%
39%
37%
33%
30%
28%
21%
5© Copyright 2013 EMC Corporation. All rights reserved.
Dark Data?
“Data not being used to get a 360 degree view of the
customer”
“Dark Data is the bulk of the organization universe”
6© Copyright 2013 EMC Corporation. All rights reserved.
Big Data Burdens
Big Data Potential
Better insight into business conditions
New Products/Services
Maximum leverage from IT investment
Big Data Challenges
Storage Optimization
Lack of Visibility
Policy Enablement
7© Copyright 2013 EMC Corporation. All rights reserved.
Turning Dark Data into Big Data
Big Data is useful…..if you are asking the right questions
Context
•How old is my data?
•What information
about customers does
it contain?
•Who created it/uses it?
Value
•What can I get rid of?
•What do I need to
retain based on
business value
•What does it cost to
store this data?
•How can I reuse and
maximize the value of
my Big Data?
Location
•Is my Big Data in the
right place?
•How/where will I move
my Big Data?
8© Copyright 2013 EMC Corporation. All rights reserved.
Why Dark Data Proliferates…
Organizations have 6 or
more repositories
Organizations have enforced
retention policies for paper and
electronic
AIIM Market Intelligence Report , 2011
Records Management Strategies – Plotting the changes”,
AIIM Market Intelligence Report , 2011
9© Copyright 2013 EMC Corporation. All rights reserved.
"Companies don't need the guy who is
good with a shovel anymore. …
They need a guy who is good with a
bulldozer."
The Cloud: Battle of the Tech Titans
Businessweek March 3, 2011
10© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2011 EMC Corporation. All rights reserved. 10
HOW DO YOU
GET CONTROL?
11© Copyright 2013 EMC Corporation. All rights reserved.
CATALOG ANALYZE ACT
BIG DATA INTELLIGENCE
CATALOG ANALYZE ACT
IDENTIFY &
INDEX
CLASSIFY SEARCH REPORT SET ACTION
12© Copyright 2013 EMC Corporation. All rights reserved.
What is Kazeon?
… Actionable Visibility into Data
Email Servers
(Exchange / Domino)
File Shares
Desktops / Laptops
Custom
Connectors
Documentum
Personal Archives
(PSTs / NSFs)
SharePoint
Archives
(SourceOne / eVault)
Backups
(Avamar )
Kazeon Appliance
• eDiscovery / FOIA
• Kazeon
13© Copyright 2013 EMC Corporation. All rights reserved.
IDENTIFY &
INDEX • Easily target loosely managed content
sources like SharePoint and file shares
for content identification
• Powerful indexing options available for
identification and retrieval of content
• Categorize content based on pre-
defined or custom made criteria
CATALOG
PRODUCTS
14© Copyright 2013 EMC Corporation. All rights reserved.
Risk Assessment Dashboard
Risk Report
By
Document
Age
Risk Report
by
Document
Location
Risk Report
By
Document
Owner
Risk Report
By
Document
Type
15© Copyright 2013 EMC Corporation. All rights reserved.
ACT
SET ACTION
• Transfer content to EMC
Documentum or secure storage
based on governance
requirements
• Delete duplicative, stale or
unnecessary content reducing
storage costs and freeing up
primary storage
• Create an automated policy-
based environment to increase
productivity and free up
resources
PRODUCTS
16© Copyright 2013 EMC Corporation. All rights reserved.
File Migration – Deduplication Report
43.66% Savings can be obtained by leveraging de-duplication
hardware for this file system.
17© Copyright 2013 EMC Corporation. All rights reserved.
File Share Cleanup Report – Modified Report
Approximately 76% of the total storage scanned has not been
modified in the past 180 – 364 days. This data is a candidate for
cheaper tier of storage, or for archive.
18© Copyright 2013 EMC Corporation. All rights reserved.
IT Policy Enforcement Example
Cleanup stale data through migration to inactive archive
Step 1:
Select files not accessed in the past 365
days
Step 2:
Select
Action -
Move
Step 1:
Select files not accessed in
the past 365 days
19© Copyright 2013 EMC Corporation. All rights reserved.
Step 3:
Select target location – Tier_2_Storage
Step 3:
Select target location
(Data Domain)
Step 4:
Set enforcement schedule
IT Policy Enforcement Example (cont.)
Cleanup stale data through migration to inactive archive
20© Copyright 2013 EMC Corporation. All rights reserved.
Kazeon Benefits
• “Drop in” appliance
– No need to setup an infrastructure, drop set and go.
• Repeatability
– Use it on a continual basis to keep file monitoring in
place, reducing costs and risk
• Flexibility
– Can be applied to file shares, laptops, desktops, MS
SharePoint, e-mail or Documentum
21© Copyright 2013 EMC Corporation. All rights reserved.
ACCEPTABLE
USE VIOLATIONS
DEFENSIBLE
DELETION UNINTENDED
EXPOSURE
SCENARIOS
22© Copyright 2013 EMC Corporation. All rights reserved.
DEFENSIBLE DELETION
THE PROBLEM
The process of manually
searching through vast sums of
content, identifying them as
records, and processing them
does not scale, taking inordinate
amounts of time and resources.
Organizations do not have the
resources to keep up with the
huge volumes of content.
THE SOLUTION
Using EMC Kazeon’s automated
indexing and classification, large
volumes of business records can
be identified and transferred to
EMC Documentum to be
managed with Documentum
Retention Policy Services
23© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2013 EMC Corporation. All rights reserved. 23
• Reduced risk of sensitive data being lost
or stolen
• Reduced risk by locating personally
identifiable information spread across
100TB of data in 9 locations
• Proactive daily scanning process of new
data to assess risk and secure sensitive
data
Financial Services Provider
24© Copyright 2013 EMC Corporation. All rights reserved.
THE PROBLEM
Employees violate acceptable
use policies, storing personal
and other non work related
content on company servers.
Content violates HR policy and
drives up costs.
ACCEPTABLE USE POLICY VIOLATIONS
BACK
THE SOLUTION
Utilize EMC Kazeon to identify
content with low business value.
Defensibly delete content.
25© Copyright 2013 EMC Corporation. All rights reserved.
THE PROBLEM
Important business information
such as trade secrets, product
plans and customer information
located in unsecure or loosely
managed environments like file
shares and Microsoft SharePoint
UNINTENDED EXPOSURE
of sensitive info on informal systems
BACK
THE SOLUTION
Utilize EMC Kazeon to identify
content with high value,
intellectual property, trade
secrets, potential risk.
Move to EMC Documentum,
protect with security,
information rights and retention
policy management.
26© Copyright 2013 EMC Corporation. All rights reserved.
Questions and Answers
To type a question via WebEx, click on the Q&A tab
Please select “Ask: All Panelists”
to ensure your questions reach us. Thank you!
27© Copyright 2013 EMC Corporation. All rights reserved.
Resources
 More Information
– Kazeon File Intelligence:
– http://www.emc.com/content-management/emc-kazeon-
file-intelligence.htm
 15 Minute Guides:
– Understand and Secure Your Content:
http://www.emc.com/collateral/software/15-min-
guide/h9774-15min-guide-understand-secure-content-
gde.htm
28© Copyright 2013 EMC Corporation. All rights reserved.
THANK YOU
Beware of the Risk Behind Big Data

Más contenido relacionado

La actualidad más candente

Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
Managing Storage - Trends, Challenges, Options in 2013 - 2014
Managing Storage - Trends, Challenges, Options in 2013 - 2014Managing Storage - Trends, Challenges, Options in 2013 - 2014
Managing Storage - Trends, Challenges, Options in 2013 - 2014EMC
 
White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...
White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...
White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...EMC
 
Green Tech Tips From Microsoft For Large Organizations
Green Tech Tips From Microsoft For Large OrganizationsGreen Tech Tips From Microsoft For Large Organizations
Green Tech Tips From Microsoft For Large OrganizationsTechSoup
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & RecoveryManufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & RecoveryInsight
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...
Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...
Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...EMC
 
Enabling a Sustainable Future
Enabling a Sustainable FutureEnabling a Sustainable Future
Enabling a Sustainable FutureIBMAsean
 
Enabling a Sustainable Future
Enabling a Sustainable FutureEnabling a Sustainable Future
Enabling a Sustainable FutureIBMAsean
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your DataInnoTech
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1Carol Jackson
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
 
Big Data for Utilities
Big Data for UtilitiesBig Data for Utilities
Big Data for UtilitiesDale Butler
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Model of solutions for data security in Cloud computing
Model of solutions for data security in Cloud computingModel of solutions for data security in Cloud computing
Model of solutions for data security in Cloud computingijcseit
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 

La actualidad más candente (20)

Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Managing Storage - Trends, Challenges, Options in 2013 - 2014
Managing Storage - Trends, Challenges, Options in 2013 - 2014Managing Storage - Trends, Challenges, Options in 2013 - 2014
Managing Storage - Trends, Challenges, Options in 2013 - 2014
 
White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...
White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...
White Paper: EMC Accelerates Journey to Big Data with Business Analytics as a...
 
Green Tech Tips From Microsoft For Large Organizations
Green Tech Tips From Microsoft For Large OrganizationsGreen Tech Tips From Microsoft For Large Organizations
Green Tech Tips From Microsoft For Large Organizations
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & RecoveryManufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...
Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...
Managing Information Storage: Trends, Challenges, and Options (2013-2014) (Wh...
 
Enabling a Sustainable Future
Enabling a Sustainable FutureEnabling a Sustainable Future
Enabling a Sustainable Future
 
Enabling a Sustainable Future
Enabling a Sustainable FutureEnabling a Sustainable Future
Enabling a Sustainable Future
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
GDPR
GDPRGDPR
GDPR
 
Big Data for Utilities
Big Data for UtilitiesBig Data for Utilities
Big Data for Utilities
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Model of solutions for data security in Cloud computing
Model of solutions for data security in Cloud computingModel of solutions for data security in Cloud computing
Model of solutions for data security in Cloud computing
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 

Similar a Beware of the Risk Behind Big Data

Why big data matters to case management
Why big data matters to case managementWhy big data matters to case management
Why big data matters to case managementmister_moun
 
Modern data integration expert sessions
Modern data integration expert sessionsModern data integration expert sessions
Modern data integration expert sessionsJessicaMurrell3
 
Modern Data Integration Expert Session Webinar
Modern Data Integration Expert Session Webinar Modern Data Integration Expert Session Webinar
Modern Data Integration Expert Session Webinar ibi
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
EMC Isilon: A Scalable Storage Platform for Big Data
EMC Isilon: A Scalable Storage Platform for Big DataEMC Isilon: A Scalable Storage Platform for Big Data
EMC Isilon: A Scalable Storage Platform for Big DataEMC
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud worldMehdi Charafeddine
 
Cw13 cloud meets big data by ibrahim alloub-emc
Cw13 cloud meets big data by ibrahim alloub-emcCw13 cloud meets big data by ibrahim alloub-emc
Cw13 cloud meets big data by ibrahim alloub-emcinevitablecloud
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Cloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementCloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementFredReynolds2
 
Big data, data science & fast data
Big data, data science & fast dataBig data, data science & fast data
Big data, data science & fast dataKunal Joshi
 
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareWebinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareStorage Switzerland
 
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaIs your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaCloudera, Inc.
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB
 
Cloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfCloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfAmeliaWong21
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeJean-Michel Franco
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Jeffrey T. Pollock
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeEMC
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 

Similar a Beware of the Risk Behind Big Data (20)

Fundamentals of Big Data
Fundamentals of Big DataFundamentals of Big Data
Fundamentals of Big Data
 
Why big data matters to case management
Why big data matters to case managementWhy big data matters to case management
Why big data matters to case management
 
Sgcp14dunlea
Sgcp14dunleaSgcp14dunlea
Sgcp14dunlea
 
Modern data integration expert sessions
Modern data integration expert sessionsModern data integration expert sessions
Modern data integration expert sessions
 
Modern Data Integration Expert Session Webinar
Modern Data Integration Expert Session Webinar Modern Data Integration Expert Session Webinar
Modern Data Integration Expert Session Webinar
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
EMC Isilon: A Scalable Storage Platform for Big Data
EMC Isilon: A Scalable Storage Platform for Big DataEMC Isilon: A Scalable Storage Platform for Big Data
EMC Isilon: A Scalable Storage Platform for Big Data
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
Cw13 cloud meets big data by ibrahim alloub-emc
Cw13 cloud meets big data by ibrahim alloub-emcCw13 cloud meets big data by ibrahim alloub-emc
Cw13 cloud meets big data by ibrahim alloub-emc
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementCloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and Management
 
Big data, data science & fast data
Big data, data science & fast dataBig data, data science & fast data
Big data, data science & fast data
 
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareWebinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
 
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaIs your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital Decoupling
 
Cloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfCloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdf
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data Lake
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 

Más de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Más de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 

Último (13)

Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 

Beware of the Risk Behind Big Data

  • 1. 1© Copyright 2013 EMC Corporation. All rights reserved. Beware of the Risk Behind Big Data Garth Landers Director, Product Marketing Information Intelligence Group Twitter - @garthlanders
  • 2. 2© Copyright 2013 EMC Corporation. All rights reserved. Agenda • Big Data/Dark Data • How to get control over Dark Data • Use Cases
  • 3. 3© Copyright 2013 EMC Corporation. All rights reserved. Big Data = Structured+Unstructured Data Structured Information In Relational Databases Managed & Unmanaged Unstructured Information Internet Of Things Telemetry, Location-Based Information etc. Non-Enterprise Information The Digital Universe Is Growing By 7,600 PB / Day
  • 4. 4© Copyright 2013 EMC Corporation. All rights reserved. Functional Areas Where Companies Are Using Big Data How Companies Are Using Big Data Analytics McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012. Customer Intimacy Budgeting & Planning Operations & Supply Chain Customer Service Performance Management New Product Strategy Pricing 0 10 20 30 40 50 49% 39% 37% 33% 30% 28% 21%
  • 5. 5© Copyright 2013 EMC Corporation. All rights reserved. Dark Data? “Data not being used to get a 360 degree view of the customer” “Dark Data is the bulk of the organization universe”
  • 6. 6© Copyright 2013 EMC Corporation. All rights reserved. Big Data Burdens Big Data Potential Better insight into business conditions New Products/Services Maximum leverage from IT investment Big Data Challenges Storage Optimization Lack of Visibility Policy Enablement
  • 7. 7© Copyright 2013 EMC Corporation. All rights reserved. Turning Dark Data into Big Data Big Data is useful…..if you are asking the right questions Context •How old is my data? •What information about customers does it contain? •Who created it/uses it? Value •What can I get rid of? •What do I need to retain based on business value •What does it cost to store this data? •How can I reuse and maximize the value of my Big Data? Location •Is my Big Data in the right place? •How/where will I move my Big Data?
  • 8. 8© Copyright 2013 EMC Corporation. All rights reserved. Why Dark Data Proliferates… Organizations have 6 or more repositories Organizations have enforced retention policies for paper and electronic AIIM Market Intelligence Report , 2011 Records Management Strategies – Plotting the changes”, AIIM Market Intelligence Report , 2011
  • 9. 9© Copyright 2013 EMC Corporation. All rights reserved. "Companies don't need the guy who is good with a shovel anymore. … They need a guy who is good with a bulldozer." The Cloud: Battle of the Tech Titans Businessweek March 3, 2011
  • 10. 10© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2011 EMC Corporation. All rights reserved. 10 HOW DO YOU GET CONTROL?
  • 11. 11© Copyright 2013 EMC Corporation. All rights reserved. CATALOG ANALYZE ACT BIG DATA INTELLIGENCE CATALOG ANALYZE ACT IDENTIFY & INDEX CLASSIFY SEARCH REPORT SET ACTION
  • 12. 12© Copyright 2013 EMC Corporation. All rights reserved. What is Kazeon? … Actionable Visibility into Data Email Servers (Exchange / Domino) File Shares Desktops / Laptops Custom Connectors Documentum Personal Archives (PSTs / NSFs) SharePoint Archives (SourceOne / eVault) Backups (Avamar ) Kazeon Appliance • eDiscovery / FOIA • Kazeon
  • 13. 13© Copyright 2013 EMC Corporation. All rights reserved. IDENTIFY & INDEX • Easily target loosely managed content sources like SharePoint and file shares for content identification • Powerful indexing options available for identification and retrieval of content • Categorize content based on pre- defined or custom made criteria CATALOG PRODUCTS
  • 14. 14© Copyright 2013 EMC Corporation. All rights reserved. Risk Assessment Dashboard Risk Report By Document Age Risk Report by Document Location Risk Report By Document Owner Risk Report By Document Type
  • 15. 15© Copyright 2013 EMC Corporation. All rights reserved. ACT SET ACTION • Transfer content to EMC Documentum or secure storage based on governance requirements • Delete duplicative, stale or unnecessary content reducing storage costs and freeing up primary storage • Create an automated policy- based environment to increase productivity and free up resources PRODUCTS
  • 16. 16© Copyright 2013 EMC Corporation. All rights reserved. File Migration – Deduplication Report 43.66% Savings can be obtained by leveraging de-duplication hardware for this file system.
  • 17. 17© Copyright 2013 EMC Corporation. All rights reserved. File Share Cleanup Report – Modified Report Approximately 76% of the total storage scanned has not been modified in the past 180 – 364 days. This data is a candidate for cheaper tier of storage, or for archive.
  • 18. 18© Copyright 2013 EMC Corporation. All rights reserved. IT Policy Enforcement Example Cleanup stale data through migration to inactive archive Step 1: Select files not accessed in the past 365 days Step 2: Select Action - Move Step 1: Select files not accessed in the past 365 days
  • 19. 19© Copyright 2013 EMC Corporation. All rights reserved. Step 3: Select target location – Tier_2_Storage Step 3: Select target location (Data Domain) Step 4: Set enforcement schedule IT Policy Enforcement Example (cont.) Cleanup stale data through migration to inactive archive
  • 20. 20© Copyright 2013 EMC Corporation. All rights reserved. Kazeon Benefits • “Drop in” appliance – No need to setup an infrastructure, drop set and go. • Repeatability – Use it on a continual basis to keep file monitoring in place, reducing costs and risk • Flexibility – Can be applied to file shares, laptops, desktops, MS SharePoint, e-mail or Documentum
  • 21. 21© Copyright 2013 EMC Corporation. All rights reserved. ACCEPTABLE USE VIOLATIONS DEFENSIBLE DELETION UNINTENDED EXPOSURE SCENARIOS
  • 22. 22© Copyright 2013 EMC Corporation. All rights reserved. DEFENSIBLE DELETION THE PROBLEM The process of manually searching through vast sums of content, identifying them as records, and processing them does not scale, taking inordinate amounts of time and resources. Organizations do not have the resources to keep up with the huge volumes of content. THE SOLUTION Using EMC Kazeon’s automated indexing and classification, large volumes of business records can be identified and transferred to EMC Documentum to be managed with Documentum Retention Policy Services
  • 23. 23© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2013 EMC Corporation. All rights reserved. 23 • Reduced risk of sensitive data being lost or stolen • Reduced risk by locating personally identifiable information spread across 100TB of data in 9 locations • Proactive daily scanning process of new data to assess risk and secure sensitive data Financial Services Provider
  • 24. 24© Copyright 2013 EMC Corporation. All rights reserved. THE PROBLEM Employees violate acceptable use policies, storing personal and other non work related content on company servers. Content violates HR policy and drives up costs. ACCEPTABLE USE POLICY VIOLATIONS BACK THE SOLUTION Utilize EMC Kazeon to identify content with low business value. Defensibly delete content.
  • 25. 25© Copyright 2013 EMC Corporation. All rights reserved. THE PROBLEM Important business information such as trade secrets, product plans and customer information located in unsecure or loosely managed environments like file shares and Microsoft SharePoint UNINTENDED EXPOSURE of sensitive info on informal systems BACK THE SOLUTION Utilize EMC Kazeon to identify content with high value, intellectual property, trade secrets, potential risk. Move to EMC Documentum, protect with security, information rights and retention policy management.
  • 26. 26© Copyright 2013 EMC Corporation. All rights reserved. Questions and Answers To type a question via WebEx, click on the Q&A tab Please select “Ask: All Panelists” to ensure your questions reach us. Thank you!
  • 27. 27© Copyright 2013 EMC Corporation. All rights reserved. Resources  More Information – Kazeon File Intelligence: – http://www.emc.com/content-management/emc-kazeon- file-intelligence.htm  15 Minute Guides: – Understand and Secure Your Content: http://www.emc.com/collateral/software/15-min- guide/h9774-15min-guide-understand-secure-content- gde.htm
  • 28. 28© Copyright 2013 EMC Corporation. All rights reserved. THANK YOU